10.08.2015 Views

Process Control Network Security

Process Control Network Security - Vurore

Process Control Network Security - Vurore

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7.3 Specific risks for PCNs7.3.1 Unsupported systemsImportant characteristics of unsupported systems are that these systems, whichare old in some respects, can’t be changed easily but are needed for operation.Because updating is hard or impossible (not supported by vendor anymore, e.g.Windows NT4), a solution could be to implement additional or compensatingmeasures. For instance, suppose the risk exists that communication betweenunsupported systems can be tampered with. Compensating measures outside ofthe system, such as isolating the PCN would not require changes to the PCNcomponents itself. An example to clarify a potential compensating control couldbe: employing a secure medium such as VPN, which makes sure that in transitcommunication can’t be tampered with (from end to end). Such a solution wouldrequire no change to the unsupported systems (if all other communicationpossibilities would be disabled) but would require a new implementation (orencapsulation by a newer system) which encodes communications onto thesecure channel and decodes communications of the secure channel into areadable format again.1 - Comparison with CIP (NERC)No information was found within the CIP standards [CIP001-1-CIP009-1] toaddress how to deal with old or unsupported systems.2 - Comparison with Good Practice Guide <strong>Process</strong> <strong>Control</strong> and SCADA <strong>Security</strong>,NISCCIn the NISCC good practice guide, unsupported systems are mentioned within theoverview. However, they are not mentioned further within the guide.3 - Comparison with Special Publication 800-53 Revision 3, NISTNIST 800-53 describes that a gap analysis needs to be performed forunsupported systems to determine the types of threats an organization canreasonably expect to counter. In addition, control SA-8 <strong>Security</strong> EngineeringPrinciples, describes that “For unsupported information systems, the organizationapplies security engineering principles to system upgrades and modifications, tothe extent feasible, given the current state of the hardware, software, andfirmware components within the system.” This is a statement which says not a lotmore than to behave in a flexible way regarding unsupported systems.7.3.1.1 SummaryThe table below summarizes the applicable controls from each of the availableframeworks. We do not feel any framework addresses the risk for unsupportedsystems in a way which would not have been obvious from a general framework.Category CIP NISCC NIST 800-53Unsupported systemsinsufficientlyaddressedinsufficientlyaddressedSA-87.3.2 Increased interconnectivityBecause PCNs are increasingly connected to the office-IT network, we believethat filters need to be implemented on all interfaces between the PCN and allconnecting non-PCN networks. Firewalls can play an important role for this<strong>Process</strong> <strong>Control</strong> <strong>Network</strong> <strong>Security</strong> Page 37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!